LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-16-2021, 10:40 AM   #1
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Rep: Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336
How do DarkSide do it?


Darkside have compromised an Irish network this time. Details below. They apparently are exploiting a flaw or loophole somewhere. Have there been any good articles on how they are doing it? Is it just windows/Citrix systems? Are people really that silly?

http://www.hse.ie got brought down over the weekend. It was a ransomware attack. They were apparently trying to lock all the server data, and everything was shut down by sysadmins.
The Irish Government has made it clear no ransom would be paid, so they must have a good backup system. They don't claim to know how bad it is yet.

Hse.ie is Ireland's Health Service Executive, and hospitals have a fairly integrated online presence there, so scans & test results can be updated remotely, & accessed remotely. That stuff is offline while they bring up the servers which may still have active ransomware. They'll be out for a few days at least and working on paper while they sort out the mess. Then the records will have to be updated with the paper. A good week's overtime coming for a lot of folks.
 
Old 05-16-2021, 11:33 AM   #2
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by business_kid View Post
Darkside have compromised an Irish network this time. Details below. They apparently are exploiting a flaw or loophole somewhere. Have there been any good articles on how they are doing it? Is it just windows/Citrix systems? Are people really that silly?
Most complex pieces of software have flaws. While some of those flaws are critical and not generally known, most systems are compromised using known exploits that haven't been patched, or even worse, using accounts with default passwords.

Yes, it is common that important or even critical systems are left for years without basic maintenance: Patches are not applied, the vendor's recommended practices are not followed, licenses are not renewed, and so on.

One may think of a criminal "hacker" as someone who carefully follows a procedure like this:
  1. A desired target is selected
  2. Information about the target is collected using public registers, network probes, phishing/social engineering, and even dumpster diving
  3. The various network components are carefully analyzed for potential vulnerabilities
  4. A cunning plan is laid to exploit said vulnerabilities
  5. Various 3rd parties (low-hanging fruit) are compromised to be used as springboards so the attack can't be traced to its real origins
  6. The actual attack is executed
While this does indeed happen, especially when nation state actors are trying to penetrate the infrastructure of other nations, more often than not a "hack" looks like this:
  1. A group of script kiddies run a botnet that probe IP addresses at random for misconfigured or vulnerable services
  2. Lists of vulnerable hosts are sold on the black market
  3. Slightly more competent criminals comb through the lists for high-value targets
  4. Malware is injected using readily available tools
  5. The malware encrypts all data, and leaves a ransom note containing a cryptocurrency wallet address
Computer security issues are just like all other security issues: They happen because of incompetence and/or lack of awareness.

Last edited by Ser Olmy; 05-16-2021 at 03:53 PM. Reason: typos
 
Old 05-16-2021, 01:16 PM   #3
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Original Poster
Rep: Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336
I got to wondering, as it's been about 1 major system per week for Darkside. In case they were using some new technique or vulnerability.
 
Old 05-16-2021, 01:48 PM   #4
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
The problem isn't finding a vulnerable target, the problem is getting away with it and making money in the process.

Russian law is extremely lax when it comes to computer crime directed at non-Russian actors. And cryptocurrencies have more or less solved the ransom payment issue.

As long as these guys stay in Russia and don't create problems for the government, they'll be fine. That is, until the Russian government decides to use them as a bargaining chip to get something from the Americans.
 
Old 05-16-2021, 01:58 PM   #5
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,707

Rep: Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720
I have only ever seen one kind of malware that was significantly OS independent. Nearly all of it is Windows malware. While it is possible to craft malware for Linux (Unix malware has a long and storied history) it has become quite rare in the last 3 decades. All of the big money for the criminals will be in infecting Windows networks and domains.

Oddly enough, many corporations that have a LOT of money transfer and IT departments who KNOW and ADVISE them on the risk will not invest in a resistant network environment with a safe mixture of operating systems, policies, and procedures until they have been impacted. Some of them not even AFTER a successful attack.

The UK and Ireland has some of the finest IT resources in the world. Getting management to pay ATTENTION to them can take a VERY big stick!

The USA is in pretty much the same boat in that regard. The Obama administration was the first to really take IT seriously, and Congress was not on board. This administration is taking it seriously, but Congress is 50% AT BEST serious about this.

Politics makes TERRIBLE tech. Business degrees and sales people make TERRIBLE tech. We need Engineers and Computer Scientists in the lead on this.
 
1 members found this post helpful.
Old 05-16-2021, 03:24 PM   #6
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,646
Blog Entries: 19

Rep: Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480Reputation: 4480
Quote:
Originally Posted by wpeckham View Post
I have only ever seen one kind of malware that was significantly OS independent. Nearly all of it is Windows malware. While it is possible to craft malware for Linux (Unix malware has a long and storied history) it has become quite rare in the last 3 decades. All of the big money for the criminals will be in infecting Windows networks and domains.
I wonder why that is when most servers run Linux. I would have thought that cracking a company's server would be much more lucrative than encrypting the files on personal laptops.
 
Old 05-16-2021, 03:35 PM   #7
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by hazel View Post
I wonder why that is when most servers run Linux. I would have thought that cracking a company's server would be much more lucrative than encrypting the files on personal laptops.
A vulnerability in a piece of software running on Linux/*BSD/Solaris/AIX/whatever might be instrumental in gaining access to a Windows-based network.

Let's say you compromise an anti-spam gateway, and now you can send genuine-looking e-mails appearing to come from any company e-mail address. By pretending you're an internal user, you can fool other users into opening a malicious attachment that exploit a vulnerability in Adobe Reader, or Word, or Excel, or the e-mail client itself.

And you don't have to compromise the internal file server in order to encrypt all the files, you just have to compromise a single Windows workstation that's in use by someone with write access to the data in question. In most Windows networks, network shares are mounted as drive letters and are thus readily available to any locally installed application. Or malware, as the case may be.

It really is a lot easier than most people think. (Edit: Once an exploitable vulnerability has been identified, that is.)

Last edited by Ser Olmy; 05-16-2021 at 03:54 PM.
 
2 members found this post helpful.
Old 05-16-2021, 07:53 PM   #8
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,360
Blog Entries: 28

Rep: Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148
A column in the Tampa Bay Times addresses this. Most of it is about how to protect yourself/your systems, but the writer includes an interesting bit about how hackers feel out their targets. It appears that a lot of planning goes into such attacks.

Here's a key bit:

Quote:
They employ a technique called probe and record. Simply put, they will attack public and private infrastructure to see how far they can get. They will record what defensive measures have been put in place, what defensive measures they did not encounter, and if there was any offensive response. This helps them build attack profiles across every sector, both private and government.
 
Old 05-17-2021, 07:49 AM   #9
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by frankbell View Post
Unfortunately it looks like it's written by someone with only superficial knowledge on the subject, which is really surprising given this line at the very bottom:
Quote:
Mark Khan is a senior information assurance cybersecurity consultant in Tampa.
Don't get me wrong, the article is generally quite good, as the author has obviously some knowledge and/or has used good sources, but then we get gems like this:
Quote:
7. Use MAC (Media Access Control) authentication whenever possible.
No, "MAC" in this context does not refer to Media Access Control-addresses, it's an acronym for "mandatory access control", a form of access control that unfortunately isn't supported on the Windows platform.

No person in the information security field would ever make a mistake like that. I hope no-one reads that article and starts creating firewall rules tying access to MAC addresses (which incidentally is a different concept called "RBAC", rule-based access control).

And speaking of things you absolutely shouldn't do:
Quote:
4. Change your passphrase every 90 days.
We know what happens when you enforce this, and it does not improve security.

Instead, it will either lead to poor password quality or, if rigorous password quality mechanisms are in place, to rampant password reuse across disparate systems and/or passwords being written down on Post-It notes. And as a bonus, the helpdesk gets overrun with password reset requests.

Instead, insist that users use passphrases. This requires something like 5 minutes of training, and it's pretty simple to enforce; just require passwords to be something like 20+ characters in length. Unfortunately, some Windows services cannot handle passwords longer than 16 characters.

The article also offers some advice in the "might sound sensible at first but either doesn't work, or simply cannot be implemented" category:
Quote:
6. Change the default access ports for all network devices.
Changing TCP/UDP port numbers is a form of "security by obscurity", and while that isn't entirely ineffective, it will typically only buy you a few extra days (at most) before the service is detected by a scripted scanner. What it certainly does do, is inconveniencing legitimate users who have to remember random port number in addition to the service URL.
Quote:
9. Review your router access logs on a weekly basis.
I'd like to give the author of this article a week's worth of logs from a VPN concentrator and tell them to examine it for any possible security issues.

What you should do instead, is implement remote logging with automated log processing. In addition to requiring a fraction of the time and manpower, it has a chance of actually detecting a security issue. Which is why it's part of almost any IDS solution.

But I'd like to give the author credit for also providing some really, really good advice that actually goes against many older best practices recommendations:
Quote:
11. Have separate devices for work and personal use.
Yes, a 1000 times yes. BYOD is a disaster waiting to happen.
Quote:
16. Make sure employees know who to contact on your security staff if they have questions about suspicious emails or websites.
Or any potential security issue really, like doors being propped open, or strangers wandering the hallways, or unsolicited calls where the caller tries to obtain information about employees or the IT infrastructure.
 
2 members found this post helpful.
Old 05-17-2021, 10:45 AM   #10
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Original Poster
Rep: Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336Reputation: 2336
Quote:
Originally Posted by Tampa Bay Times
Mark Khan is a senior information assurance cybersecurity consultant in Tampa.
May I translate that line? Somebody thinks the sun, moon and start shine out of his a** and is overpaying him. I didn't see a single mention of umasks or permissions, or care with servers. He obviously is good at reinstalling windows.

@Ser Olmy: I thought you posted a very (for me)educational critique. Yes, I have witnessed the carnage that occurs when users on Monday show up with a cumulative Weekend hangover only to discover their passwords have been changed :-). It was 11 o'clock and 3 folks out of 50ish were logged in. I'm sure nobody in this country insists on secure passwords; extremely few use VPNs; a small minority have guest networks; device encryption of separate devices are unheard of, especially phones. In fact, there's a regular trade here in 2nd hand Dell Latitudes, which were company Laptops with high specs used for a year or two by IT devs or high flyers and sold on. Such a machine could easily be purloined by any member of the opposite sex on a one-night stand - passwords and all.

A few of the organizations may do one of the long term company recommendations, maybe two, but only if it comes from the top down. It's never led by sysadmins. There's a few guys who will be fired if they install X on a server. They run the tight ships. It's also common to outsource linux maintenance here. ISPs have linux & BSD savvy guys ok.
 
Old 05-17-2021, 05:42 PM   #11
leclerc78
Member
 
Registered: Dec 2020
Posts: 169

Rep: Reputation: Disabled
Why can't Windows/Linux set something like that:
3 strikes you are out - come back in 15 minutes.
 
Old 05-17-2021, 06:00 PM   #12
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by leclerc78 View Post
Why can't Windows/Linux set something like that:
3 strikes you are out - come back in 15 minutes.
They can.

Now imagine how that would work if an account that's used for remote login or a web based service is the subject of a brute force password attack. How would you log on when your account is constantly being locked?
 
Old 05-17-2021, 06:05 PM   #13
astrogeek
Moderator
 
Registered: Oct 2008
Distribution: Slackware [64]-X.{0|1|2|37|-current} ::12<=X<=15, FreeBSD_12{.0|.1}
Posts: 6,269
Blog Entries: 24

Rep: Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206Reputation: 4206
Quote:
Originally Posted by Ser Olmy View Post
11. Have separate devices for work and personal use.
Which I would expand to include...

Quote:
11.x Have separate logins on each device (i.e. separate home directories and access control) for as many separable activities as are important to you from a security viewpoint.
 
Old 05-17-2021, 07:10 PM   #14
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,707

Rep: Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720Reputation: 2720
RE: Item 4 response.
Quote:
Originally Posted by Ser Olmy View Post
And speaking of things you absolutely shouldn't do:We know what happens when you enforce this, and it does not improve security.

Instead, it will either lead to poor password quality or, if rigorous password quality mechanisms are in place, to rampant password reuse across disparate systems and/or passwords being written down on Post-It notes. And as a bonus, the helpdesk gets overrun with password reset requests.
I have to totally agree on this point. I believe anyone who has lived through it from an IT, operations, or helpdesk position could not argue that point! That does not mean that password changes should not be required, but that the advice and procedure had better be well thought out and combined with other requirements to ensure security.
Quote:
Instead, insist that users use passphrases. This requires something like 5 minutes of training, and it's pretty simple to enforce; just require passwords to be something like 20+ characters in length. Unfortunately, some Windows services cannot handle passwords longer than 16 characters.
Again I agree that Pass phrases are far more secure than simple passwords. However I prefer a slightly different solution. Where it is possible: some form of 2-factor authentication cannot be recorded on a 3m sticky note, and need not be a major budget item for the company. I prefer a solution that combines a time/standard based randomizer with a pin code or additional indentifier, but there are other secure options.

The point is that it does not take very much to improve on the simple, short, password that is vulnerable to deciphering, misuse or sharing, capture, or dictionary attacks. And on that I KNOW we agree!

Last edited by wpeckham; 05-17-2021 at 07:12 PM.
 
Old 05-17-2021, 10:07 PM   #15
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,360
Blog Entries: 28

Rep: Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148
Quote:
Why can't Windows/Linux set something like that:
3 strikes you are out - come back in 15 minutes.
fail2ban.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
The darkside of the cloud. DGLx Linux - Virtualization and Cloud 22 01-14-2015 04:30 PM
I've Gone Back to the Darkside Mrrrr. Nice Guy General 46 03-09-2005 06:21 AM
GTKPOD is form the darkside... Enlightened Linux - Software 6 07-15-2004 12:26 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:57 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration